-
11141
Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain
Published 2022-08-01“…To solve the security hazards of identity information and transaction data and the time-consuming problem of traditional single-level encryption methods in the current application scenarios of consortium blockchain, a privacy protection scheme of consortium blockchain based on fair blind signature and hierarchical encryption was proposed.Considering the strong centrality and poor security of the existing fair blind signature scheme, it was redesigned with zero-knowledge proof technology to be applicable for consortium blockchain application scenario.Based on the Paillier homomorphic encryption algorithm, a supervisable hierarchical encryption method was designed, and the method realized the supervision of encrypted transaction data information and reduced the time cost of the encryption and decryption process.The security analysis and simulation results show that the proposed scheme can effectively resist malicious attacks such as tampering and eavesdropping and significantly improve the encryption efficiency.…”
Get full text
Article -
11142
A Computational Realization of a Semi-Lagrangian Method for Solving the Advection Equation
Published 2014-01-01“…Performance of a sequential algorithm and several parallel implementations with the OpenMP and CUDA technologies in the C language has been studied.…”
Get full text
Article -
11143
Low pilot overhead parametric channel estimation scheme for RIS-assisted mmWave MIMO systems
Published 2024-09-01“…Then, a non-iterative channel estimation algorithm was derived using tensor canonical polyadic decomposition with Vandermonde structure constraints. …”
Get full text
Article -
11144
Effect of Learning Rate on the Recognition of Images
Published 1996-01-01“…The back propagation technique is considered. A computer algorithm is deduced and applied. In this work, the synthetic textures are generated. …”
Get full text
Article -
11145
Low-hit frequency-hopping communication systems for power Internet of things random access
Published 2023-01-01“…The communication network is an essential component of the data acquisition and information transmission in power Internet of things (IoT).To meet the development requirements of multiple power service in the future, the wireless communication technique with flexible-access and high scalability is one of the development directions for power IoT.Due to the features of large-scale access, random access time, high security and reliability for information transmission of power IoT, a frequency-hopping (FH) technique with low-hit rate for random access was proposed.The construction algorithm of such FH pattern was based upon the combination and shift operation of conventional FH sequences.By the theoretical arithmetic and numerical simulation, the properties of the proposed FH pattern and the error-rate of the FH-based power IoT were evaluated.The analysis reveals that the new class of FH sequences and the system can meet the requirements of large-scale access and highly reliable communication for the power IoT, which has good application prospects.…”
Get full text
Article -
11146
Analysis and Parameter Optimum of a New 4-DOF 4PPaRR Parallel Mechanism
Published 2019-07-01“…Then a performance index is defined in order to analyze the rotational capacity of 4PPaRR parallel mechanism, The scale optimization of parallel mechanism size is carried out based on Grasshopper Optimization Algorithm(GOA)in the end. The research results show that the 4PPaRR parallel mechanism has larger workspace and rotation capability. …”
Get full text
Article -
11147
Enhancing the Efficiency and Accuracy of MLFMA-PO Hybrid Method for Analyzing Electrically Large Objects
Published 2015-01-01“…An enhanced hybrid technique combining the multilevel fast multipole algorithm (MLFMA) and the physical optics (PO) is presented for analyzing scattering and radiation by electrically large structures. …”
Get full text
Article -
11148
Sculpture 3D Modeling Method Based on Image Sequence
Published 2021-01-01“…This thesis first introduces the basic principles of model-based image sequence coding technology, then discusses in detail the specific steps in various implementation algorithms, and proposes a basic feature point calibration required in three-dimensional motion and structure estimation. …”
Get full text
Article -
11149
RESEARCH ON SPEED AND PRESSURE CONTROL STRATEGY OF STABLE SWITCH ABOUT FOREPOLING EQUIPMENT
Published 2017-01-01“…Taking into account the operational principle of forepoling equipment,and as the target to improving support efficiency and reducing the disturbance on the roof in the process of supporting,a kind of speed and pressure composition control method was presented.The control method adopts the constant pump driven directly by servo motor to replace the traditional electro-hydraulic proportional valve,and the variable structure algorithm based on the fuzzy sliding mode was used as control strategy.Theoretical analysis and experimental results show that,compared with the traditional speed and pressure control method,the control method presented in the paper can reduce concussion on the roof in the process of switching from speed control to pressure control,and can improve support efficiency.Research findings can provide a theoretical basis for the development and control strategy of forepoling equipment.…”
Get full text
Article -
11150
On the Principles and Decisions of New Word Translation in Sino-Japan Cross-Border e-Commerce: A Study in the Context of Cross-Cultural Communication
Published 2023-01-01“…The results show that the algorithm in this paper achieves the best performance on both the BLEU and METEOR evaluation metrics.…”
Get full text
Article -
11151
Routing approach based on local topology control in cognitive radio networks
Published 2016-05-01“…An approach of topology control and routing was proposed according to the characteristics of cogni ive radio networks,which considered multi factors optimization with fusion of primary users and secondary users.And the ap-proach took the spectrum utilization of primary users the interference from secondary users to primary users into ac-count.Then a joint link cost was defined combining the predicted cognitive link stability with the link power consump-tion.Furthermore,the local cognitive topology control routing(LCTCR)algorithm with minimizing the link cost was presented,which was used to optimize the network topology.Meanwhile,the network path was selected according to the optimized network topology.Theoretical analysis and simulation experiments show that the link power consumption and the link stability are also important parameters and need to be jointly optimized when selecting the network path.Only by doing so can it guarantee that the selected path is optimal.…”
Get full text
Article -
11152
PROBLEMS OF STRATEGIC MANAGEMENT OF BUSINESS PROCESSES IN THE CONTEXT OF INTEGRATED DIGITALIZATION OF HIGH-TECH INDUSTRIES
Published 2020-09-01“…The novelty and scientific value of the work lies in the fact that the result of the study was a reasonable author’s approach to studying the specifics of the digital economy in Russian industry, as well as the development of an algorithm for identifying and solving existing problems of digitalization, taking into account the peculiarities of high-tech industries.…”
Get full text
Article -
11153
Substructure correlation adaptation transfer learning method based on K-means clustering
Published 2023-03-01“…Domain drifts severely affect the performance of traditional machine learning methods, and existing domain adaptive methods are mainly represented by adaptive adjustment cross-domain through global, class-level, or sample-level distribution adaptation.However, too coarse global matching and class-level matching can lead to insufficient adaptation, and sample-level adaptation to noise can lead to excessive adaptation.A substructure correlation adaptation (SCOAD) transfer learning algorithm based on K-means clustering was proposed.Firstly, multiple subdomains of the source domain and the target domain were obtained by K-means clustering.Then, the matching of the second-order statistics of the subdomain center was sought.Finally, the target domain samples were classified by using the subdomain structure.The proposed method approach further improves the performance of knowledge transfer between the source and target domains on top of the traditional approach.Experimental results on common transfer learning datasets show the effectiveness of the proposed method.…”
Get full text
Article -
11154
Using deep learning for detecting BotCloud
Published 2016-11-01“…Finally, in order to detect BotCloud, it utilized CNN algorithm to learn and extract characteristics that were more abstract to express the hidden model and structural relationship in the network data flow. …”
Get full text
Article -
11155
Two-level feature selection method based on SVM for intrusion detection
Published 2015-04-01“…To select optimized features for intrusion detection,a two-level feature selection method based on support vector machine was proposed.This method set an evaluation index named feature evaluation value for feature selection,which was the ratio of the detection rate and false alarm rate.Firstly,this method filtrated noise and irrelevant features to reduce the feature dimension respectively by Fisher score and information gain in the filtration mode.Then,a crossing feature subset was obtained based on the above two filtered feature sets.And combining support vector machine,the sequential backward selection algorithm in the wrapper mode was used to select the optimal feature subset from the crossing feature subset.The simulation test results show that,the better classification performance is obtained according to the selected optimal feature subset,and the modeling time and testing time of the system are reduced effectively.…”
Get full text
Article -
11156
Innovation of Teaching Method of Digital Media Art Based on Convolutional Neural Network
Published 2022-01-01“…In order to improve the effect of digital media art teaching, this study combines the neural network algorithm to carry out the innovation of digital media art teaching resource management and teaching method innovation. …”
Get full text
Article -
11157
Two-Dimensional Fuzzy Spatial Relations: A New Way of Computing and Representation
Published 2012-01-01“…In this paper, we propose a method for combining fuzzy topological and directional relations. We also propose an algorithm for defuzzification of relations which provides us a binary topological and directional relation between a 2D object pair. …”
Get full text
Article -
11158
Research on Design and Application of National Fitness System
Published 2021-01-01“…On this basis, through the collection of users’ fitness data rating data, the data are transformed into fitness data rating matrix, and the matrix is analyzed and calculated to realize the intelligent recommendation of fitness data and complete the design of national fitness data recommendation algorithm. The test results show that the system can meet the requirements of normal use, good compatibility, and user score is high and has high practical application value.…”
Get full text
Article -
11159
Cryptocurrency Financial Risk Analysis Based on Deep Machine Learning
Published 2022-01-01“…Development of deep learning algorithms opens the horizons for the development of electronic businesses that use digital currency. …”
Get full text
Article -
11160
A PI-Type Sliding Mode Controller Design for PMSG-Based Wind Turbine
Published 2019-01-01“…Finally, the simulation results verify the correctness and effectiveness of this algorithm.…”
Get full text
Article